Rashid and his online friends
Transcription
Rashid and his online friends
Virtual Cyberspace Stories Rashid and his online friends 1 When Rashid opened his social networking page, he found a friend request from a person named ‘Hassan’. According to his information, Hassan was an intermediate school student (same age as Rashid) who loved online electronic games and called himself ‘The Knockdown’. 2 Through online gaming, the two began to chat and found out that both had many shared interests such as buying newly launched electronic games and collecting games from the internet. One day Rashid was playing online with Jaber, who was in primary school and was also an active online game player. Jaber kept asking Rashid questions about the game’s tactics and techniques as he was new to the game. Since Rashid was social by nature, he didn’t mind helping out his friends. 3 Whenever Rashid faced difficulties in passing challenging stages of the game, he turned to his new friend ‘The Knockdown’ for help. Eventually, Rashid was able to skillfully skip these stages and remain in the game, which demanded great effort. He was able to pass the rest of the participants until his name was placed at the top of the list. He felt proud and was grateful to Hassan who was also in the game among other players. Days later, Rashid met Hassan in a chat-room and asked him of any new games he had. “I have a new game called Labyrinth, which is an interesting game that requires skills and intelligence,” replied Hassan. 4 “Uh, I’ve heard of it from Jaber and everyone else, who keeps talking about it on the Internet. We should go and buy it,” said Rashid. “You don’t need to buy it. It’s really expensive. You can borrow my CD and return it when you’re done with it,” suggested Hassan. “Thanks Hassan, but I prefer buying my own copy.” “Well, I have a good idea, what do you think of exchanging games instead of buying the same ones? We get different games, share them and doing that we’d save more money,” said Hassan. “What a great idea, Hassan.” “Let’s go for it today! I’ll meet you at the mall’s car park in half an hour.” A number of police officers swiftly got out of their cars and arrested the man. Rashid was shocked and in disbelief. “Are you saying that Hassan and Hassan’s father are the same person?” asked Rashid astonished. Rashid was worried, scared and very surprised. “Yes, that’s right,” said the policeman. 7 A few minutes later, a car stopped and a man introduced himself as Hassan’s father. “Hassan is still at the mall but told me to pass you these games.” “These are a lot, I had only asked for one,” said Rashid. “Thank you so much, it’s very kind of you.” “We’ve been going after such scams for a very long time. Our goal is to reveal their bad intentions of pretending they are someone else to deceive innocent people and today we succeeded. “I came by a taxi.” 6 10 “What about him? Is he also a bad person?” asked Rashid. “Tell me, how did you get here?” When he arrived, Rashid called his friend’s number but was surprised to hear a man’s voice. “I have another surprise for you about your friend Jaber.” “Not a problem, Hassan is very fond of you. He talks a lot about you, your talented skills and passion in online gaming.” “How is that! Hassan should have told me to give you a ride. Get in, we’ll take you home instead of waiting for a cab. Hop in we’ll go to fetch Hassan.” “Hi, may I speak to Hassan please?” asked Rashid. “Hello, I’m Hassan’s father. He’s in one of the stores to get something but will come now. Where are you?” answered the man. “I’m at gate number one wearing a green shirt,” answered Rashid. “No son. Jaber is me! When you told me an hour ago online that you’re leaving to meet Hassan, we knew that he was the person we have been trying to track down and catch. Let me give you an important piece of advice son. Don’t easily trust people on the Internet. You have to be very careful as you don’t know the kind of people you are dealing with or their motives. You should never share your address, phone number, age or gender with your online friends, always check your friends and ask for your parent’s advice.” “We are on the other side of the mall, we’re on our way.” Lessons learned 5 Both online friends exchanged phone numbers. “How about taking a taxi? Unless you want to wait a few more days - because I will be away on camp and won’t be back for another two days.” Rashid told Jaber of his meeting with Hassan and rushed to take a cab to meet his friend at the mall. “Well when you arrive, call me on my cell phone to tell me exactly where you are,” said Hassan. 9 “Don’t worry son, we’re the police. We are here to arrest so-called ‘The Knockdown’ or Hassan because he’s a fraud. He earns children’s trust, then drags them into doing very bad things. We’re very pleased that we were following him and caught him red-handed. Rashid got inside the car with Hassan’s father, but the car was suddenly surrounded by a group of police cars. “My father is not at home and I have no one to take me there,” said Rashid disappointedly. “I’ll be there! … I will excuse myself from my online friends and quickly come to you.” replied Rashid. News_Letter_05.indd 1-4 8 Police officers comforted Rashid and introduced themselves to him. • Be careful while dealing with others via the Internet • Do not disclose your personal information to everyone you know on the Internet • Do not believe everything that is said in chat rooms and forums. You have to be cautious • Things on the Internet are not always true 12/12/11 10:59 AM Use the Internet safely - in a public place A Father’s Advice…. Always check the title of the page you want to log into: Today, I received an email from a social network asking me to experience has shown me the need to be closer to them and verify the identity of the user by clicking on a specific link in carefully control activities on the Internet. Some educational the message. I was very surprised, as I had never requested and psychological professionals suggest that young children’s the network to create an account for me. Out of curiosity, I online usage should be through what is called the ‘family went to the site, entered the data sent to me and there came computer’, which is a computer that is accessible to all and is the shock! placed in an open and shared place by all family members to I have a daughter who is seven-years-old and a son who is allow parents the opportunity to pay attention, even indirectly, six. Both were recently introduced to the Internet and started to the activities of their young children on the Internet. to play with their peers online. I used to choose some safe Storytelling: A colleague of mine told me that he had a educational sites for them myself. There are several sites that good way of educating young kids of the dangers caused by the are set up by educational institutions or large companies that Internet through the use of an interesting narrative technique. provide age-appropriate leisure and entertainment services. He tells real stories about the Internet and each story has The shock which I did not expect was the fact that children a lesson to be learnt. For example he chooses a character at this early age are able to access other websites and fill ‘Amina’ then tells her story and how she was deceived by in the required data to login, including private and sensitive information. My kids spontaneously entered information in the data page which required an email to activate this subscription. To my surprise, I found out that they entered my full name, date of birth, as well as my place of work. social networking and chat-room sites. Children in early stages interact with such stories which become part of their understanding and behavior. Thus this reflects on how they deal with the Internet. We should also continuously warn them of the dangers the Internet holds and the importance of letting us know of With this experience, I thought I’d any experiences where they may be share with you useful tips to prevent faced with criminal behavior. This some of the dangers and problems associated with our involves luring, meeting invitations children’s savvy than we think: I personally started to use the computer when I was studying at university, and began to use the Internet after I graduated from college and joined my first job; while my younger brother started to use the computer and the Internet when he was a teenager. I recently discovered that my children - who just started going to school - were able to use the computer, access the Internet and register with chat and social networking sites. Through this simple comparison, we can conclude that our children are more tech-savvy than we think and shouldn’t assume that although our computer and Internet usage didn’t start until we were older, that the same will apply to the new generation’s thoughts, activities and interests, which are completely different from their parents. Be closer: I thought that I had done my best in terms of selecting safe educational sites for my children and therefore was confident that their use of the Internet in this early age would be limited to what I selected for them. However, this If one day you decide to open your email account in an Internet café or lab, you will automatically enter your username and password into the login page. If error messages such as ‘please try again later’ or ‘the system is under construction’ appear, you should be aware that this page is not the real page and would be surprised to know that it is a designed fake page. When you enter your private information, it is stored in a secret file which is copied or secretly sent via email to the hackers and allow them to access your account later, after having access to all your private data. It is more dangerous and destructive when such acts are used to enter pages of bank accounts via internet. Advice: Before you begin typing the requested information, check the name of the site in the URL address bar or close the browser completely and reopen it then type the desired address. 1 Many of us use computers in 3 It is not enough to logout of your account when finished, it is a good habit to close the browser upon completion of reviewing your email account and deleting history files.. There are some browsers that have security gaps such as retrieving the history by repeatedly clicking on the ‘back’ button and have the previous pages appear on screen. Things may not be that simple, but in certain cases, these anti-security measures were found. It better to be safe than risk someone accessing personal information. public places to access the Internet, for example, you may visit the library and use the Advice: When you finish browsing, immediately delete the ‘History Files’ as well as the ‘Temporary Files’ from the browser directory, then close the browser before leaving the computer by clicking on the x. devices available to surf the web, use Internet cafes when travelling or kiosks in shopping malls, or through computer labs at school or university. These are some useful tips that may help you protect your information and not violate the privacy of others, especially when computers in such sites are used by Check safety, security and privacy features of the Internet surfer: many people. At times, there are untrustworthy people I recently went to an Internet café to check my email. When entering my username, a long list of names of previous users appeared. Out of curiosity, I clicked on one of the names and was astonished to see the password bar was filled with stars which appeared before my eyes, which meant that I had a complete access to that person’s account. who wait to access other’s private accounts and social networking pages, steal or impersonate people’s identity for illegal purposes, such as identity theft. This feature is known as ‘AutoComplete’ - which can be useful when using our own personal laptops and computers at home on in the office, but certainly not in public computers. Advice: disable ‘AutoComplete’ feature before using the computer and check it after usage. This is done through the setup setting of the used browser. If using Microsoft Internet Explorer browser, click on: 1) 2) 3) 4) Tools menu Choose Internet Options Content AutoComplete (where you must disable the feature especially Username and Password). If using Internet Explorer browser, click on: 1) 2) 3) 4) 5) 6) Tools menu Choose Internet Options Content AutoComplete Select Settings Delete AutoComplete History (select what is required - we recommend you select all available options to all be deleted). Be careful when you temporarily leave the computer: 2 4 When using a public computer, you may sometimes need to leave the computer for few minutes. You will need to be cautious as someone may be observing your moves and may want to check the screen or tamper with the information while you are away. Advice: Do not leave the computer unattended even if for a short period of time. If you urgently need to move, nonetheless follow the advice above. You are also advised to remove your plugged-in flash memory device as it may be vulnerable to sabotage, copying or installing spyware during your absence. or requests for personal information access to the Internet. Our children are more tech- Close your browser when you finish and delete history files: such as home address, phone numbers, credit card numbers and the like. Learning new technologies: It is extremely useful to be at least informed of new applications on the Internet, and understand the advantages and risks of those applications so that we can warn our children and Cookies are not always delicious! These small files can be dangerous and may be used by Cookies may not be important for some of us but are It is a violation of user privacy to distribute such information some sites or hackers to cause harm. For instance, files may important to others. The process of gathering information is without contain access information to websites such as username, conducted in a hidden way to the user who does not know how themselves. so they are able to directly identify the location of the much and what type of information is gathered about him/her. We advise readers to go through the ‘help page’ in the browser user when the site is visited again, without asking Some sites are simple and some collect a lot of information to find out how to get rid of cookies. You will also find security to re-enter username. There may also be a which would violate user privacy, for example browsing and word. The word ‘cookies’ in its true sense is and privacy settings of the Internet surfer. form filling page and the user may discover visiting websites is something private - if users were given the kind of delicious biscuits that most of us that some information already exists without the choice, they may reject the idea of collecting information Do you like cookies? Your answer could be a ‘yes’ or a ‘no’, this depends on the real meaning of the protect them against such risks. love, which can be found in supermarkets When my younger brother asked me to send him a “Tweet” and restaurants. But since we use this word to denote something in the Internet, Other ways of using these files On the other hand, collecting data of surfer’s activities I didn’t really understand what he meant, even though I am it is quite different, so what is meant by may exceed beyond gathering the information. The obtained a daily user of the Internet. I surf the news sites, check my is to monitor the behavior of web surfers ‘cookies’ in the cyber world? to be made available to marketing and information may subsequently be sold to institutions email and complete many of the electronic services such as and companies who could commercially benefit from online banking and e-Procurement, but is that all there is? Of advertising firms to recognize the interests Cookies are small text files which contain the information for marketing purposes. course not, in today’s world there are many other electronic of users according to the stored information information that can be used by some applications. Technology has become an essential part of collected in the ‘cookies’ files. Since this is Internet websites. our mobile phones which may not be within our interest or these files is now known as ‘Flash Cookies’ practice. For instance, social networks such as Facebook, which are used in displaying and improving the live-chat IM like BlackBerry, instant messaging via Twitter Internet websites in a more interactive way. and downloading or displaying videos on YouTube. Another version of This information varies from one website to another, but on being entered. getting authorization from the web Safe Space �سيف �سبي�س SPACE S A F E ﺳﻴﻒ ﺳ Published by ictQatar - Issue No. 2 - December 2011 ﺒ ﻴﺲ Electronic Communication Networks – most preferred Internet option in today’s world Measurement, research statistics and studies on the activity Such phones include iPhone, Blackberry and Nokia of Internet users indicate that electronic social networks such Smartphone which provide social networking applications as Facebook, Twitter, MySpace, Bebo, as well as tens or even within the basic software package. In addition to cameras hundreds of other available networks are the most commonly and internet services which allow us to publish, update and used services by web users today. Perhaps the reason lies in exchange information, images and videos in easy and quick the easy usage of these networks and the diversity of services ways. associated with them. For instance, these networks may be The statistics indicate there are more than three billion used for personal or family memory recording purposes and users of these social networks. During July this year (2011), interactions, promotional and advertising companies, or to Facebook announced the number of its users had reached broadcast news and incidents. 750 million worldwide. The easy access to technology is adding to the popularity of These statistics give us a good idea of the impact of these these networks and the increased number of users. Today’s networks and how people interact with one another via online technology is available to almost everyone, either via home social networking as one of the preferred options for Internet computers or laptops, and more importantly smart mobile users. This virtual world has become an integral part of our phones - which have become affordable for most of us. daily lives and activities. surfers in such files. automatic, web surfers would not notice that their online behavior is being watched. The information, which is linked to the activity and Contact Address PO Box: 23264 Al Nasser Tower Al Corniche Street 13 Tel: 44995333 - Fax: 449359 a ce.q spa afe Email: info@s behavior of web surfers, is analyzed by specialized persons in marketing and advertising agencies. It allows the whole, it contains information about the visitors to that page. them to display ads and windows of promotional products The following are some important points about ‘cookie’ files: based on the nature of users’ activities and surfing. for more info, visit our website www.safespace.qa News_Letter_05.indd 5-8 12/12/11 10:59 AM